Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)
Software Networks: Virtualization, SDN, 5G and Security (Networks & Telecommunication: Advanced Networks)

The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datacenters facilities. Main problems concern 1) the placement of virtual resources for opening a new network on the fly, and 2) the urbanisation of virtual resource implemented on physical network...

Python and AWS Cookbook
Python and AWS Cookbook

If you intend to use Amazon Web Services (AWS) for remote computing and storage, Python is an ideal programming language for developing applications and controlling your cloud-based infrastructure. This cookbook gets you started with more than two dozen recipes for using Python with AWS, based on the author’s boto library.

...
Intel Galileo Essentials
Intel Galileo Essentials

Leverage the power of Intel Galileo to construct amazingly simple, yet impressive projects

About This Book

  • Learn how to connect additional hardware to the Intel Galileo to easily create complex robots
  • Understand GPIO pins on the Galileo and how to use them
  • Control a DC...
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
Controlling Energy Demands in Mobile Computing Systems (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to the problem of managing the energy demand of mobile devices. Reducing energy consumption, primarily with the goal of extending the lifetime of battery-powered devices, has emerged as a fundamental challenge in mobile computing and wireless communication. The focus of this lecture is on a systems approach...
PHP Application Development with NetBeans: Beginner's Guide
PHP Application Development with NetBeans: Beginner's Guide
Productivity is an important factor for a software developer. A good development environment or surrounding tools with the essence of a particular programming flavor can boost up our coding productivity and yield a quality and optimized software product. In order to maintain a fast-paced development, developers seek the environment...
Cytokines and Autoimmune Diseases
Cytokines and Autoimmune Diseases

Leading researchers synthesize scattered experimental data to help develop an intimate understanding of how cytokines and chemokines are involved in the pathogenesis of autoimmune diseases. The many chapters offer critical reviews the basic mechanisms controlling cytokine induction and regulation, as well as the resulting production of...

American Bar Association Family Legal Guide
American Bar Association Family Legal Guide
The American Bar Association Family Legal Guide offers the most comprehensive, useful, and authoritative information available on how the law affects individuals at home, at work, and at play. This practical guide will help consumers steer clear of many legal pitfalls and will guide readers to a better understanding of their rights and...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Internet of Things with Intel Galileo
Internet of Things with Intel Galileo

Employ the Intel Galileo board to design a world of smarter technology for your home

About This Book

  • Discover some of Galileo's best development options using Arduino and Node.js
  • Build complex projects in the field of Internet of Things and integrate with IoT platforms
  • ...
Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life
Who's Pulling Your Strings?: How to Break the Cycle of Manipulation and Regain Control of Your Life

Many people suffer from relationships that leave them feeling manipulated and out of control. Whether it's within the context of a personal relationship, a family member, a friend, or someone at the workplace, these "toxic" relationships can erode a person's self-confidence and self-esteem, and have a strong, negative effect on their...

Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Development and Performance Evaluation of an Adaptive MAC Protocol for MC-CDMA Wireless LANs with QoS Support
Amobile adhoc network, is a system of autonomous mobile terminals connected by wireless links. Being independent of any infrastructure, these networks have the ability to be deployed easily, fast and cost efficient. The objective of this thesis is to exploit the advantages of the application of Code Division Multiple Access (CDMA) in the lower...
Manage IT!: Organizing IT Demand and IT Supply
Manage IT!: Organizing IT Demand and IT Supply
"This book discusses IT supply and demand, analyzing functional requirements and operational processes, using methods such as those defined in the IT infrastructure library (ITIL). This book will be useful for understanding the key concepts behind modern service-oriented IT organizations. In a nutshell, this is a good book and a good...
unlimited object storage image
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy